⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 secpod_trendmicro_officescan_bof_vuln_sept08_900220.nasl

📁 漏洞扫描源码,可以扫描linux,windows,交换机路由器
💻 NASL
字号:
###############################################################################  Trend Micro OfficeScan Server cgiRecvFile.exe Buffer Overflow Vulnerability##  Copyright: SecPod##  Date Written: 2008/09/18##  Revision: 1.1##  Log: veerendragg#  Issue #0223#  ------------------------------------------------------------------------#  This program was written by SecPod and is licensed under the GNU GPL #  license. Please refer to the below link for details,#  http://www.gnu.org/licenses/gpl.html#  This header contains information regarding licensing terms under the GPL, #  and information regarding obtaining source code from the Author. #  Consequently, pursuant to section 3(c) of the GPL, you must accompany the #  information found in this header with any distribution you make of this #  Program.#  ------------------------------------------------------------------------############################################################################## desc["english"] = " Overview : This Remote host is installed with Trend Micro OfficeScan, which is prone to Buffer Overflow Vulnerability. Vulnerability Insight :        The flaw is caused due to error in cgiRecvFile.exe can be exploited        to cause a stack based buffer overflow by sending a specially crated        HTTP request with a long ComputerName parameter.        Impact : Remote exploitation could allow execution of arbitrary code to        cause complete compromise of system and failed attempt leads to denial        of service condition. Impact Level : Application/System. Affected Software/OS :        Trend Micro OfficeScan Corporate Edition version 8.0        Trend Micro OfficeScan Corporate Edition versions 7.0 and 7.3        Trend Micro Client Server Messaging Security (CSM) for SMB versions 2.x and 3.x Fix : Partially Fixed. Fix is available for Trend Micro OfficeScan 8.0, 7.3 and Client Server Messaging Security (CSM) 3.6. Apply patch Trend Micro OfficeScan Corporate Edition 8.0 from http://www.trendmicro.com/ftp/products/patches/OSCE_8.0_Win_EN_CriticalPatch_B1361.exe http://www.trendmicro.com/ftp/products/patches/OSCE_8.0_SP1_Win_EN_CriticalPatch_B2424.exe http://www.trendmicro.com/ftp/products/patches/OSCE_8.0_SP1_Patch1_Win_EN_CriticalPatch_B3060.exe Apply patch Trend Micro OfficeScan Corporate Edition 7.3 from http://www.trendmicro.com/ftp/products/patches/OSCE_7.3_Win_EN_CriticalPatch_B1367.exe Apply patch Trend Micro Client Server Messaging Security (CSM) 3.6 from http://www.trendmicro.com/ftp/products/patches/CSM_3.6_OSCE_7.6_Win_EN_CriticalPatch_B1195.exe References : http://secunia.com/advisories/31342/ http://securitytracker.com/alerts/2008/Sep/1020860.html http://www.juniper.net/security/auto/vulnerabilities/vuln31139.html CVSS Score :        CVSS Base Score     : 9.3 (AV:N/AC:M/Au:NR/C:C/I:C/A:C)        CVSS Temporal Score : 7.1 Risk factor : High";if(description){ script_id(900220); script_bugtraq_id(31139); script_cve_id("CVE-2008-2437"); script_copyright(english:"Copyright (C) 2008 SecPod"); script_version("Revision: 1.1 "); script_category(ACT_GATHER_INFO); script_family(english:"Misc."); script_name(english:"Trend Micro OfficeScan Server cgiRecvFile.exe Buffer Overflow Vulnerability."); script_summary(english:"Check for the version of Trend Micro OfficeScan"); script_description(english:desc["english"]); script_dependencies("secpod_reg_enum.nasl"); script_require_keys("SMB/WindowsVersion"); exit(0);} include("smb_nt.inc"); include("secpod_smb_func.inc"); if(!get_kb_item("SMB/WindowsVersion")){        exit(0); } scanVer = registry_get_sz(key:"SOFTWARE\TrendMicro\OfficeScan\service" +                                "\Information", item:"Server_Version"); if(!scanVer){	exit(0); } if(!egrep(pattern:"^([0-7]\..*|8\.0)$", string:scanVer)){	exit(0); } offPath = registry_get_sz(key:"SOFTWARE\TrendMicro\OfficeScan\service" +                               "\Information", item:"Local_Path"); if(!offPath){	exit(0); } report = string("\n *****\n NOTE : Ignore this warning if the above mentioned" +                  "patch is already applied.\n *****\n"); # For Trend Micro Client Server Messaging Security and Office Scan 8 or 7.0 if(registry_key_exists(key:"SOFTWARE\TrendMicro\CSM") ||                         scanVer =~ "^(8\..*|[0-7]\.[0-2](\..*)?)$"){        security_hole(data:string(desc["english"], report));        exit(0); } share = ereg_replace(pattern:"([A-Z]):.*", replace:"\1$", string:offPath); file =  ereg_replace(pattern:"[A-Z]:(.*)", replace:"\1",                       string:offPath + "Web\CGI\cgiRecvFile.exe"); name    =  kb_smb_name(); login   =  kb_smb_login(); pass    =  kb_smb_password(); domain  =  kb_smb_domain(); port    =  kb_smb_transport(); if(!port){	port = 139; } if(!get_port_state(port)){        exit(0); }  soc = open_sock_tcp(port); if(!soc){        exit(0); }  r = smb_session_request(soc:soc, remote:name); if(!r) {        close(soc);        exit(0); } prot = smb_neg_prot(soc:soc); if(!prot) {        close(soc);        exit(0); } r = smb_session_setup(soc:soc, login:login, password:pass, domain:domain, prot:prot); if(!r) {        close(soc);        exit(0); } uid = session_extract_uid(reply:r); r = smb_tconx(soc:soc, name:name, uid:uid, share:share); tid = tconx_extract_tid(reply:r); if(!tid) {        close(soc);        exit(0); } fid = OpenAndX(socket:soc, uid:uid, tid:tid, file:file); if(!fid) {        close(soc);        exit(0); } fileVersion = GetVersion(socket:soc, uid:uid, tid:tid, fid:fid); if(!fileVersion){        exit(0); } # grep for file version < 7.3.0.1367 if(egrep(pattern:"^7\.3\.0\.(0?[0-9]?[0-9]?[0-9]|1[0-2][0-9][0-9]|" +                  "13[0-5][0-9]|136[0-6])$", string:scanVer)){        security_warning(0); }

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -